Cybersecurity

123456789101112131415161718
Across
  1. 2. attempt to exploit vulnerabilities
  2. 4. spread by phishing
  3. 6. malicious violator
  4. 7. malicious software
  5. 8. unauthorized act
  6. 11. secure string of characters
  7. 14. software that monitors online activity
  8. 15. hardware/software to prevent unauthorized access
  9. 17. scam without a rod and reel
  10. 18. recognizable pattern
Down
  1. 1. software to fix vulnerabilities
  2. 3. being unprotected
  3. 5. secure entry
  4. 9. vulnerability
  5. 10. the use of fake addresses
  6. 12. process of verifying identity
  7. 13. enticed by an incentive
  8. 16. a virus or device that captures data